The Challenging View of Big Data Mining PA Tak, SV Gumaste, SA Kahate International Jоurnal of Advаnced Reseаrch in Cоmputer Science аnd Sоftware …, 2015 | 8 | 2015 |
Comprehensive Analysis of Privacy Attacks in Online Social Network: Security Issues and Challenges S Kahate International Journal of Safety and Security Engineering 12 (4), 507-518, 2022 | 6 | 2022 |
Different Framework for Single Sign On (SSO) BK Subhash, PK SA International Journal of Computer Science and Mobile Computing 53, 2016 | 6 | 2016 |
Software as a service with cloud computing MRA Akojwar, MRV Kothari, MSA Kahate, MRD Ganvir IJECCE 3 (1), 149-155, 2012 | 4 | 2012 |
New approach for web crawler using data mining to discover deep web R Bangar, S Kahate, PG Scholar International Journal of Engineering Science 6509, 2016 | 3 | 2016 |
Implementing authentication mechanism using extended public key cryptography in wireless network SA Kahate, KN Hande Int J Adv Res Comput Sci Software Eng 2 (5), 35-40, 2012 | 3 | 2012 |
Traceability Mechanism for Sharing Data in Cloud KJ Rasal, SA Kahate | 3* | |
Design of a Deep Learning Model for Cyberbullying and Cyberstalking Attack Mitigation via Online Social Media Analysis SA Kahate, AD Raut 2023 4th International Conference on Innovative Trends in Information …, 2023 | 1 | 2023 |
An Enhanced Data Confidentiality in Online Social Networks Using Quantum Key Management with a Blockchain Approach SAKAD Raut IEEE, 1-6, 2023 | 1 | 2023 |
Improving Distance Based Unsupervised Outlier Detection using Anti-hubs S GavaleP, S KahateP Int. J. Sci. Eng. Appl. Sci., 2016 | 1 | 2016 |
Design Model for Two Server Password Authentication Protocol NS Burande, SA Kahate International Journal of Science, Engineering and Computer Technology 5 (11 …, 2015 | 1 | 2015 |
Survey on privacy preserving public auditing techniques for shared data in the cloud KJ Rasal, SV Gumaste, SA Kahate identity 4 (3), 2015 | 1 | 2015 |
Keylogger Use for Security of A Personal Computer SA Kahate International Journal of Engineering 2 (1), 2013 | 1 | 2013 |
Design of Game Application using Android Architecture V Shital, G Sonal, C Vaishnavi, A Sandip International Journal of Advanced Research in Computer Science, 2013 | 1 | 2013 |
A Review on Data Confidentiality Issues of User's Information on Social Networks. SA Kahate, AD Raut International Journal of Next-Generation Computing 13 (3), 2022 | | 2022 |
MACHINE LEARNING MODEL TO RECOGNIZE THE ORIGINALITY OF GIVEN IMAGES TO GUARANTEE WHETHER IMAGE OF AN ACTUAL FACE OR AN IMAGE OF A FAKE FACE SAK RDiwate IN Patent 33/2,021, 2021 | | 2021 |
QoS Web Services Using Numerical Temporal Planning analysing and Testing MSP Shinde, SA Kahate measurement 2 (06), 2016 | | 2016 |
Secure kNN Query Processing using VD-kNN In an Untrusted Cloud Enviroments MMD Rokade, SA Kahate Asian Journal For Convergence In Technology (AJCT) ISSN-2350-1146 2, 2016 | | 2016 |
Superior Traceability Machine for Shared Data in the Cloud MRK Jayesh, SV Gumaste, SA Kahate International Journal of Scientific and Research Publications, 2015 | | 2015 |
Overview of Preference-Based Web Service Frame SP Shinde, SA Kahate | | 2015 |